Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-7pr3-9p48-wx7x
In the Linux kernel, the following vulnerability has been resolved:s390/decompressor: specify __decompress() buf len to avoid overflowHistorically calls to __decompress() didn't specify "out_len" parameter on many architectures including s390, expecting that no writes beyond uncompressed kernel image are performed. This has changed since commit 2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer (#2751)"). Now zstd decompression code might store literal buffer in the unwritten portion of the destination buffer. Since "out_len" is not set, it is considered to be unlimited and hence free to use for optimization needs. On s390 this might corrupt initrd or ipl report which are often placed right after the decompressor buffer. Luckily the size of uncompressed kernel image is already known to the decompressor, so to avoid the problem simply specify it in the "out_len" parameter.
[]
GHSA-p88m-27c7-422h
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
[]
CVE-2018-7753
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
[ "cpe:2.3:a:mozilla:bleach:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bleach:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bleach:2.1.2:*:*:*:*:*:*:*" ]
CVE-2022-25788
A maliciously crafted JT file in Autodesk AutoCAD 2022 may be used to write beyond the allocated buffer while parsing JT files. This vulnerability can be exploited to execute arbitrary code.
[ "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*", "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:macos:*:*", "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*", "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*" ]
GHSA-jr37-6xf9-g2x4
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119.
[]
CVE-2022-46091
Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter.
[ "cpe:2.3:a:online_flight_booking_management_system_project:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-2p6v-c8r2-4f2q
IBM Control Desk 7.6.1 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 219126.
[]
GHSA-xx49-72mm-f757
Windows NT 4.0 beta allows users to read and delete shares.
[]
GHSA-5633-fxcw-h329
Cross-Site Request Forgery (CSRF) vulnerability in Foliovision: Making the web work for you Foliopress WYSIWYG allows Cross Site Request Forgery. This issue affects Foliopress WYSIWYG: from n/a through 2.6.18.
[]
CVE-2024-44758
An arbitrary file upload vulnerability in the component /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 allows attackers to execute arbitrary code via uploading crafted files.
[ "cpe:2.3:a:erp:management_software:*:*:*:*:*:*:*:*" ]
CVE-2023-45587
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 allows attacker to execute unauthorized code or commands via crafted HTTP requests
[ "cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*" ]
CVE-2011-1355
Open redirect vulnerability in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.19 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the logoutExitPage parameter.
[ "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*" ]
GHSA-49fm-cm32-q45w
startkde in KDE for Caldera OpenLinux 2.3 through 3.1.1 sets the LD_LIBRARY_PATH environment variable to include the current working directory, which could allow local users to gain privileges of other users running startkde via Trojan horse libraries.
[]
GHSA-24q4-rxhj-p299
Directory traversal vulnerability in chroot function in AtheOS 0.3.7 allows attackers to escape the jail via a .. (dot dot) in the pathname argument to chdir.
[]
GHSA-h7gw-jv92-h37j
Insufficient data validation in QR scanner in Google Chrome on iOS prior to 90.0.4430.72 allowed an attacker displaying a QR code to perform domain spoofing via a crafted QR code.
[]
CVE-2021-31956
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20045:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25632:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20045:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20044:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*" ]
GHSA-xp9f-x7wr-8cp4
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-cc65-vj4f-xm35
An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'.
[]
CVE-2020-28032
WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2019-9196
The Face authentication component in Aware mobile liveness 2.2.1 sdk 2.2.0 for Knomi allows a Biometrical Liveness authentication bypass via parameter tampering of the /knomi/analyze security_level field.
[ "cpe:2.3:a:aware:knomi:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:aware:knomi:2.2.1:*:*:*:*:*:*:*" ]
CVE-2021-46566
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15027.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
GHSA-3gp5-92h5-h855
Jenkins Path Traversal vulnerability
Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors.
[]
GHSA-6r92-cgxc-r5fg
Denial of service in CBOR library
ImpactDue to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.Affected versions _include_ versions 4.0.0 through 4.5.0.This vulnerability was privately reported to me.PatchesThis issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.)WorkaroundsAgain, users should use the latest version of this library.In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—it begins with a byte other than 0x80 through 0xDF, orit does not contain a byte in the range 0xa0 through 0xBF.Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.For more informationIf you have any questions or comments about this advisory:Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
[]
CVE-2024-2088
NextScripts: Social Networks Auto-Poster <= 4.4.3 - Authenticated(Subscriber+) Sensitive Information Exposure
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.3 via the 'nxs_getExpSettings' function. This makes it possible for authenticated attackers, with subscriber access and above, to extract sensitive data including social network API keys and secrets.
[]
CVE-2024-53285
Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in DDNS Record functionality in Synology Router Manager (SRM) before 1.3.1-9346-10 allows remote authenticated users with administrator privileges to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*" ]
GHSA-chqw-c679-9rg5
An information disclosure and remote code execution vulnerability in the slinger web server of the BlackBerry QNX Software Development Platform versions 6.4.0 to 6.6.0 could allow an attacker to potentially read arbitrary files and run arbitrary executables in the context of the web server.
[]
GHSA-x6w4-6wg6-779c
XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpFindLoadedDllByHandle+0x0000000000000031."
[]
GHSA-mjrf-hfxf-xr5r
Cross-site scripting (XSS) vulnerability in view.php in phpRaid 2.9.5 allows remote attackers to inject arbitrary web script or HTML via the (1) URL query string and the (2) Sort parameter.
[]
GHSA-32xx-934q-wgcw
Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.
[]
CVE-2016-2386
SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.
[ "cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*" ]
CVE-2015-8033
In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.
[ "cpe:2.3:a:textpattern:textpattern:4.5.7:*:*:*:*:*:*:*" ]
GHSA-5cff-6mj2-j7qq
Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Tools and Frameworks). The supported version that is affected is 11.3.1.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
GHSA-3x36-m3fq-9jv8
SQL injection vulnerability in the login page in flexycms/modules/user/user_manager.php in SimpleHRM 2.3, 2.2, and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to index.php/user/setLogin.
[]
GHSA-xqrq-qgmp-x7x4
Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers (e.g., IE10) that do not automatically URL encode parameters were still vulnerable.
[]
GHSA-gfp3-9j64-8w7j
ZF Roll Stability Support Plus (RSSPlus) is vulnerable to an authentication bypass vulnerability targeting deterministic RSSPlus SecurityAccess service seeds, which may allow an attacker to remotely (proximal/adjacent with RF equipment or via pivot from J2497 telematics devices) call diagnostic functions intended for workshop or repair scenarios. This can impact system availability, potentially degrading performance or erasing software, however the vehicle remains in a safe vehicle state.
[]
GHSA-32h4-r3wm-53g5
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
[]
CVE-2013-6735
IBM WebSphere Portal 6.0.0.x through 6.0.0.1, 6.0.1.x through 6.0.1.7, 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x through 8.0.0.1 CF08 allows remote attackers to obtain sensitive Java Content Repository (JCR) information via a modified Web Content Manager (WCM) URL.
[ "cpe:2.3:a:ibm:websphere_portal:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*" ]
CVE-2020-4636
IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503.
[ "cpe:2.3:a:ibm:resilient_security_orchestration_automation_and_response:38.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
GHSA-7h8w-xx2f-hmr7
readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
[]
CVE-2023-45990
Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges.
[ "cpe:2.3:a:wenwen-ai:wenwenai_cms:1.0:*:*:*:*:*:*:*" ]
CVE-2010-4579
Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog.
[ "cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*" ]
GHSA-f46r-h7vv-mxcr
Cross-site scripting (XSS) vulnerability in role deletion in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allows remote authenticated users to inject arbitrary web script or HTML via the role name, aka SAP Security Note 2153898.
[]
GHSA-vg97-vhcr-wjv6
AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
[]
CVE-2018-11202
A NULL pointer dereference was discovered in H5S_hyper_make_spans in H5Shyper.c in the HDF HDF5 1.10.2 library. It could allow a remote denial of service attack.
[ "cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*" ]
GHSA-4qqx-hf2g-m26g
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18653.
[]
GHSA-7845-crfj-phc4
Script security bypass vulnerability in Jenkins Shared Library Version Override Plugin
Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. This allows attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. Shared Library Version Override Plugin 19.v3a_c975738d4a_ declares folder-scoped library overrides as untrusted, so that they’re executed in the Script Security sandbox.
[]
CVE-2020-21474
File Upload vulnerability in NucleusCMS v.3.71 allows a remote attacker to execute arbitrary code via the /nucleus/plugins/skinfiles/?dir=rsd parameter.
[ "cpe:2.3:a:nucleuscms:nucleuscms:3.71:*:*:*:*:*:*:*" ]
GHSA-cv8j-wfmq-4fjv
In the Linux kernel, the following vulnerability has been resolved:net: sched: fix memory leak in tcindex_partial_destroy_workSyzbot reported memory leak in tcindex_set_parms(). The problem was in non-freed perfect hash in tcindex_partial_destroy_work().In tcindex_set_parms() new tcindex_data is allocated and some fields from old one are copied to new one, but not the perfect hash. Since tcindex_partial_destroy_work() is the destroy function for old tcindex_data, we need to free perfect hash to avoid memory leak.
[]
GHSA-cgjw-gcp3-vh4m
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
[]
CVE-2023-27168
An arbitrary file upload vulnerability in Xpand IT Write-back Manager v2.3.1 allows attackers to execute arbitrary code via a crafted jsp file.
[ "cpe:2.3:a:xpand-it:write-back_manager:2.3.1:*:*:*:*:*:*:*" ]
CVE-2019-1219
An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory, aka 'Windows Transaction Manager Information Disclosure Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2002-2310
ClickCartPro 4.0 stores the admin_user.db data file under the web document root with insufficient access control on servers other than Apache, which allows remote attackers to obtain usernames and passwords.
[ "cpe:2.3:a:kryptronic:clickcartpro:4.0:*:*:*:*:*:*:*" ]
GHSA-g93q-f2ww-cqcx
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1953, CVE-2015-1954, CVE-2015-1963, CVE-2015-1964, and CVE-2015-1965.
[]
GHSA-gx4f-r59p-mgpx
In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
[]
CVE-2021-1535
Cisco SD-WAN vManage Information Disclosure Vulnerability
A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the Cisco SD-WAN vManage Software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to allow the attacker to view sensitive information on the affected system.
[ "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*" ]
GHSA-34wj-ch2p-7g5r
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4. A non-privileged user may be able to modify restricted settings.
[]
CVE-2020-1968
Raccoon attack
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:ethernet_switch_es2-64_firmware:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:h:oracle:ethernet_switch_es2-64:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:ethernet_switch_es2-72_firmware:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:h:oracle:ethernet_switch_es2-72:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:ethernet_switch_es1-24_firmware:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:oracle:ethernet_switch_es1-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:ethernet_switch_tor-72_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:h:oracle:ethernet_switch_tor-72:-:*:*:*:*:*:*:*" ]
GHSA-vfgc-wr54-m4r5
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
[]
CVE-2013-4152
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue.
[ "cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:m1:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:m2:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:m3:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:m4:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0.m1:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.0.m2:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:springsource:spring_framework:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:4.0.0:milestone1:*:*:*:*:*:*" ]
GHSA-955q-2rmr-5vhw
The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string.
[]
CVE-2018-4974
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-mh3p-j9c3-vqpj
Cross-site scripting vulnerability exists in VK All in One Expansion Unit versions prior to 9.100.1.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product.
[]
CVE-2024-41710
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
[ "cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6865i_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6867i_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6869i_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6873i_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6930_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6940_sip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitel:6970_conference_firmware:*:*:*:*:*:*:*:*" ]
GHSA-xx9g-fvg8-hmfw
The API on Winston 1.5.4 devices is vulnerable to CSRF.
[]
CVE-2015-0437
Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
[ "cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update25:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*" ]
CVE-2022-28417
Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_phase.
[ "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-hqvh-84g9-cp75
Unspecified vulnerability in the SIP server in SIP Enablement Services (SES) in Avaya Communication Manager 3.1.x and 4.x allows remote authenticated users to cause a denial of service (resource consumption) via unknown vectors.
[]
CVE-2020-10991
Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java
[ "cpe:2.3:a:mulesoft:aplkit:*:*:*:*:*:*:*:*" ]
CVE-2024-57964
Insecure Loading of Dynamic Link Libraries in HVAC Energy Saving Program
Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems. This issue affects HVAC Energy Saving Program:.
[]
CVE-2018-0584
IIJ SmartKey App for Android version 2.1.0 and earlier allows remote attackers to bypass authentication [effect_of_bypassing_authentication] via unspecified vectors.
[ "cpe:2.3:a:iij:smartkey:*:*:*:*:*:android:*:*" ]
CVE-2020-21535
fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.
[ "cpe:2.3:a:xfig_project:fig2dev:3.2.7:b:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2019-19218
BMC Control-M/Agent 7.0.00.000 has Insecure Password Storage.
[ "cpe:2.3:a:bmcsoftware:control-m\\/agent:7.0.00.000:*:*:*:*:*:*:*" ]
CVE-2021-33107
Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access.
[ "cpe:2.3:a:intel:active_management_technology_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:setup_and_configuration_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8145ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_8350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_8350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3_9350kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_9350kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8210y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8257u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8365u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8365ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_8600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_8600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9500f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_9600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_9600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_l16g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5_m480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_m480:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8557u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8569u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8665u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8665ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:10510u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:10510y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:10710u:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_1060ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_1060ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8086k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8086k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8500y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8500y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8550u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8550u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8559u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8559u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8560u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8560u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8565u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8565u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_8700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_8700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_9700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_9700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_9700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_9700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_9700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_9700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_9700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7_9700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7_9700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:7900x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:7920x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:7940x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:7960x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:7980xe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9880h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9880h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9_9980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9_9980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*" ]
CVE-2021-3041
Cortex XDR Agent: Improper control of user-controlled file leads to local privilege escalation
A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version.
[ "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2021-44680
An issue (4 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14075).
[ "cpe:2.3:a:veritas:enterprise_vault:*:*:*:*:*:*:*:*" ]
CVE-2019-10930
A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.
[ "cpe:2.3:a:siemens:digsi_5_engineering_software:7.90:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:siprotec_5_digsi_device_driver:7.90:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*" ]
GHSA-3vh2-7wc2-pg3v
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1256.
[]
CVE-2020-0485
In areFunctionsSupported of UsbBackend.java, there is a possible access to tethering from a guest account due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-166125765
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
GHSA-vx8w-6r69-h5fv
An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. Under certain conditions, merge request IDs were being disclosed via email.
[]
CVE-2020-8153
Improper access control in Groupfolders app 4.0.3 allowed to delete hidden directories when when renaming an accessible item to the same name.
[ "cpe:2.3:a:nextcloud:group_folders:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
GHSA-39m4-87qv-j7j7
Stack-based buffer overflow in the plugin in Apple QuickTime before 7.7.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTMovie object.
[]
CVE-2020-4584
IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574.
[ "cpe:2.3:a:ibm:i2_ibase:*:*:*:*:*:*:*:*" ]
GHSA-6gvh-974v-q8vj
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in libopenjp2.so.
[]
GHSA-x5pv-35h7-pm8q
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
[]
CVE-2022-1802
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2024-41785
IBM Concert cross-site scripting
IBM Concert Software 1.0.0 through 1.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*" ]
CVE-2024-27148
Local Privilege Escalation and Remote Code Execution using insecure PATH
The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL.
[ "cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*" ]
CVE-2006-4802
Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allows local users to execute arbitrary code via an unspecified vector related to alert notification messages, a different vector than CVE-2006-3454, a "second format string vulnerability" as found by the vendor.
[ "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:8.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*" ]
GHSA-vq7p-w2xr-pwxr
Command injection vulnerability in networking of QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to run arbitrary commands.
[]
CVE-2014-8322
Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.
[ "cpe:2.3:a:aircrack-ng:aircrack-ng:*:*:*:*:*:*:*:*", "cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta3:*:*:*:*:*:*" ]
CVE-2006-5241
Multiple PHP remote file inclusion vulnerabilities in OpenDock Easy Gallery 1.4 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) file.php; (2) find_user.php, (3) lib_user.php, (4) lib_form_user.php, and (5) user.php in sw/lib_user/; (6) find_session.php and (7) session.php in sw/lib_session/; (8) comment.php and (9) lib_comment.php in sw/lib_comment/; and other unspecified PHP scripts.
[ "cpe:2.3:a:opendock:easy_gallery:*:*:*:*:*:*:*:*" ]
CVE-2014-3878
Multiple cross-site scripting (XSS) vulnerabilities in the web client interface in Ipswitch IMail Server 12.3 and 12.4, possibly before 12.4.1.15, allow remote attackers to inject arbitrary web script or HTML via (1) the Name field in an add new contact action in the Contacts section or unspecified vectors in (2) an Add Group task in the Contacts section, (3) an add new event action in the Calendar section, or (4) the Task section.
[ "cpe:2.3:a:ipswitch:imail_server:12.3:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail_server:12.4:*:*:*:*:*:*:*" ]
CVE-2003-1408
Lotus Domino Server 5.0 and 6.0 allows remote attackers to read the source code for files via an HTTP request with a filename with a trailing dot.
[ "cpe:2.3:a:lotus:domino_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_server:6.0:*:*:*:*:*:*:*" ]
CVE-2002-0503
Directory traversal vulnerability in boilerplate.asp for Citrix NFuse 1.5 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the NFuse_Template parameter.
[ "cpe:2.3:a:citrix:nfuse:1.5:*:*:*:*:*:*:*" ]
GHSA-7736-7gm2-mw57
Knowage (formerly SpagoBI) 6.1.1 allows CSRF via every form, as demonstrated by a /knowage/restful-services/2.0/analyticalDrivers/ POST request.
[]
GHSA-9p62-9q9c-q4wv
Improper access control vulnerability in the system date/time setting page of SolarView Compact SV-CPT-MC310 versions prior to Ver.8.10 and SV-CPT-MC310F versions prior to Ver.8.10 allows a remote authenticated attacker to alter system date/time of the affected product.
[]
GHSA-39h6-pqr3-34cv
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
[]
CVE-2021-26877
Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
GHSA-g2f6-h5vw-x98w
A vulnerability classified as problematic was found in Campcodes Complete Web-Based School Management System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument category leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263800.
[]
CVE-2002-1322
Rational ClearCase 4.1, 2002.05, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain packets to port 371, e.g. via nmap.
[ "cpe:2.3:a:rational_software:clearcase:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:rational_software:clearcase:2002-05-00:*:*:*:*:*:*:*" ]